Modeling and Verification of IPSec and VPN Security Policies.
Hazem H. HamedEhab S. Al-ShaerWill MarreroPublished in: ICNP (2005)
Keyphrases
- security policies
- network security
- access control
- intrusion detection
- computer networks
- security management
- security concerns
- network management
- network traffic
- security requirements
- distributed systems
- intrusion detection system
- home network
- unauthorized access
- database systems
- access control systems
- information security
- anomaly detection
- dimensionality reduction